Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentially endanger a system’s security
Information security has for long time been a field of study in computer science, software engineeri...
Background: Cybersecurity has risen to international importance. Almost every organization will fall...
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing...
peer reviewedInspired by the root cause analysis techniques that in the field of safety research and...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
In the aftermath of cybersecurity incidents within organizations, explanations of their causes often...
peer reviewedWe propose an operational framework for a social, technical and contextual analysis of ...
In the aftermath of cybersecurity incidents within organizations, explanations of their causes often...
In the aftermath of cybersecurity incidents within organizations, explanations of their causes often...
Computer systems and internet are becoming pervasive in our everyday life. Being online brings the c...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
The human and organisational factors contributing to information security are still poorly understoo...
peer reviewedRecent initiatives that evaluate the security of physical systems with objects as asset...
Cyber security risks are socio-technical in nature. They result not just from technical vulnerabilit...
Information security has for long time been a field of study in computer science, software engineeri...
Background: Cybersecurity has risen to international importance. Almost every organization will fall...
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing...
peer reviewedInspired by the root cause analysis techniques that in the field of safety research and...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
In the aftermath of cybersecurity incidents within organizations, explanations of their causes often...
peer reviewedWe propose an operational framework for a social, technical and contextual analysis of ...
In the aftermath of cybersecurity incidents within organizations, explanations of their causes often...
In the aftermath of cybersecurity incidents within organizations, explanations of their causes often...
Computer systems and internet are becoming pervasive in our everyday life. Being online brings the c...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
The human and organisational factors contributing to information security are still poorly understoo...
peer reviewedRecent initiatives that evaluate the security of physical systems with objects as asset...
Cyber security risks are socio-technical in nature. They result not just from technical vulnerabilit...
Information security has for long time been a field of study in computer science, software engineeri...
Background: Cybersecurity has risen to international importance. Almost every organization will fall...
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing...